[PDF][PDF] Implementation and performance analysis of improved DSR routing protocol to Detect an inimical node in MANETs using NS-2

A Saini, V Singh - … Journal for Research and Development in …, 2013 - academia.edu
In this paper we have introduced an inimical node into DSR routing protocol implementation
by which we found that it affects the working of DSR and degrades its performance. So to …

OLSR Fuzzy Cost (OLSR-FC): an extension to OLSR protocol based on fuzzy logic and applied to avoid selfish nodes

DAM José, RF Bulcão-Neto, VS Patto… - Revista de Informática …, 2019 - seer.ufrgs.br
The mobile ad-hoc networks (MANET) are those whose nodes have mobility, energy
restriction and operate simultaneously as end systems and router. One of the main problems …

[PDF][PDF] Genetic Optimization Based Adaptive approach for the determination of Black Hole Attack in aodv protocol

C Singh, V Walia, R Malhotra - 2nd international conference on …, 2015 - academia.edu
ABSTRACT MANET is a self-configuring infrastructure less network. The lacks of an
infrastructure in ad hoc networks pose large challenges in the functionality of these …

[PDF][PDF] Simulation based Performance Comparison of Reactive and Proactive Routing Protocols of MANET Under CBR and TCP Traffic Model

M Adibaru, E Nekemte - International Journal of Engineering …, 2016 - academia.edu
MANETS are connected and established between mobile nodes temporarily for a short
period of time for the purpose of sharing information and exchanging messages among the …

[PDF][PDF] Performance Comparison of Black Hole Attack Detection Mechanism in 6lowpan over Manet

R Sujatha, P Srivaramangai - Int. J. Adv. Res. Comput. Sci, 2018 - pdfs.semanticscholar.org
Black Hole Attack is the most vulnerable attacks in the network layer of wireless
environment. In MANET, the existing techniques were proposed to detection and mitigate …

[PDF][PDF] E-APSAR: Enhanced Anonymous Position Based Security Aware Routing Protocol For Manets

P Malgi, U Padwalkar - 2014 - academia.edu
In the past few years, we have seen a rapid expansion in the field of mobile computing due
to the pro-liferation of inexpensive, widely available wireless devices or networks. However …

[HTML][HTML] OLSR Fuzzy Cost (OLSR-FC): uma extensão ao protocolo OLSR baseada em lógica Fuzzy e aplicada à prevenção de nós egoístas

DAM José - 2014 - bdtd.ibict.br
This work contributes with an extension to the Optimized Link State Routing protocol (OLSR)
called Fuzzy Cost OLSR (OLSR-FC). In order to prevent selfish nodes as well as to improve …

[PDF][PDF] Modifications of AODV Routing Protocol to Prevent the Effects of Blackhole Attack in MANET

M Adibaru, MA Hussien - academia.edu
Mobile adhoc networks (MANETs) are composed of independent and self organized nodes
without the need of any infrastructure. Mobile adhoc networks consist of mobile devices that …

[PDF][PDF] Implementasi Serangan Black Hole pada Mobile Ad-Hoc Network dengan Pergerakan Dinamis Terstruktur menggunakan Protokol Dynamic Source Routing

T Istiqomah, RA Siregar, DP Kartikasari - … Teknologi Informasi dan …, 2018 - j-ptiik.ub.ac.id
MANET merupakan salahJsatu teknologi nirkabellyang terdiriKdari beberapa node
bergerak yang tersusun tanpaminfrastruktur tetap. Dengan tidak adanya suatu infrastruktur …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY MITIGATION OF BLACK HOLE ATTACK USING GENERIC …

R Kumar, R Chadha - core.ac.uk
ABSTRACT A black hole is a node that always responds positively to every PREQ, even
though it does not really have a valid route to the destination node. Since a black hole does …